Le firewall applicatif Symantec installé sur le serveur Dorade contient le paramétrage suivant :
Network Entity Report
Name:
AgentsEsentry
Description:
Type: Group
NetworkEntity Member:
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
NetworkEntity Member:
Name: Fleche
Description:
Type: Host
Address: 10.1.4.2
MAC Address:
====================================================
Name: Cassiopee6
Description:
Type: Host
Address: 192.168.0.8
MAC Address:
====================================================
Name: Cassiopee7
Description:
Type: Host
Address: 192.168.0.7
MAC Address:
====================================================
Name: ClientsE-Sentry
Description:
Type: Group
NetworkEntity Member:
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
NetworkEntity Member:
Name: Fleche
Description:
Type: Host
Address: 10.1.4.2
MAC Address:
====================================================
Name: ClientsMessagerie
Description:
Type: Group
NetworkEntity Member:
Name: Cassiopee6
Description:
Type: Host
Address: 192.168.0.8
MAC Address:
NetworkEntity Member:
Name: Cassiopee7
Description:
Type: Host
Address: 192.168.0.7
MAC Address:
NetworkEntity Member:
Name: Portable
Description:
Type: Host
Address: 192.168.0.9
MAC Address:
====================================================
Name: ClientsNTPinterne
Description:
Type: Group
NetworkEntity Member:
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
NetworkEntity Member:
Name: Dauphin
Description:
Type: Host
Address: 52.30.184.1
MAC Address:
NetworkEntity Member:
Name: Eridan
Description:
Type: Host
Address: 10.1.3.3
MAC Address:
NetworkEntity Member:
Name: Fleche
Description:
Type: Host
Address: 10.1.4.2
MAC Address:
NetworkEntity Member:
Name: GrandeOurse
Description:
Type: Host
Address: 10.1.3.2
MAC Address:
NetworkEntity Member:
Name: Loup
Description:
Type: Host
Address: 10.1.4.4
MAC Address:
NetworkEntity Member:
Name: Pegase
Description:
Type: Host
Address: 10.1.2.2
MAC Address:
NetworkEntity Member:
Name: PetiteOurse
Description:
Type: Host
Address: 10.1.4.3
MAC Address:
NetworkEntity Member:
Name: Serpent
Description:
Type: Host
Address: 10.1.4.5
MAC Address:
====================================================
Name: ClientsSamba
Description:
Type: Group
NetworkEntity Member:
Name: Cassiopee6
Description:
Type: Host
Address: 192.168.0.8
MAC Address:
NetworkEntity Member:
Name: Cassiopee7
Description:
Type: Host
Address: 192.168.0.7
MAC Address:
NetworkEntity Member:
Name: PetiteOurse
Description:
Type: Host
Address: 10.1.4.3
MAC Address:
NetworkEntity Member:
Name: Portable
Description:
Type: Host
Address: 192.168.0.9
MAC Address:
====================================================
Name: ClientsWeb
Description:
Type: Group
NetworkEntity Member:
Name: Cassiopee6
Description:
Type: Host
Address: 192.168.0.8
MAC Address:
NetworkEntity Member:
Name: Cassiopee7
Description:
Type: Host
Address: 192.168.0.7
MAC Address:
NetworkEntity Member:
Name: Portable
Description:
Type: Host
Address: 192.168.0.9
MAC Address:
====================================================
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
====================================================
Name: DNSexterne1
Description:
Type: Host
Address: 194.2.0.20
MAC Address:
====================================================
Name: DNSexterne2
Description:
Type: Host
Address: 194.2.0.50
MAC Address:
====================================================
Name: DNSexterne3
Description:
Type: Host
Address: 212.46.206.2
MAC Address:
====================================================
Name: DNSexternes
Description:
Type: Group
NetworkEntity Member:
Name: DNSexterne1
Description:
Type: Host
Address: 194.2.0.20
MAC Address:
NetworkEntity Member:
Name: DNSexterne2
Description:
Type: Host
Address: 194.2.0.50
MAC Address:
NetworkEntity Member:
Name: DNSexterne3
Description:
Type: Host
Address: 212.46.206.2
MAC Address:
====================================================
Name: Dauphin
Description:
Type: Host
Address: 52.30.184.1
MAC Address:
====================================================
Name: EnsembleMachinesMaquette
Description:
Type: Group
NetworkEntity Member:
Name: Cassiopee6
Description:
Type: Host
Address: 192.168.0.8
MAC Address:
NetworkEntity Member:
Name: Cassiopee7
Description:
Type: Host
Address: 192.168.0.7
MAC Address:
NetworkEntity Member:
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
NetworkEntity Member:
Name: Dauphin
Description:
Type: Host
Address: 52.30.184.1
MAC Address:
NetworkEntity Member:
Name: Eridan
Description:
Type: Host
Address: 10.1.3.3
MAC Address:
NetworkEntity Member:
Name: Fleche
Description:
Type: Host
Address: 10.1.4.2
MAC Address:
NetworkEntity Member:
Name: GrandeOurse
Description:
Type: Host
Address: 10.1.3.2
MAC Address:
NetworkEntity Member:
Name: Hercule-autorisation-10.1.3.1
Description:
Type: Host
Address: 10.1.3.1
MAC Address:
NetworkEntity Member:
Name: Hercule-externe-192.168.0.1
Description:
Type: Host
Address: 192.168.0.1
MAC Address:
NetworkEntity Member:
Name: Hercule-interco-10.1.6.1
Description:
Type: Host
Address: 10.1.6.1
MAC Address:
NetworkEntity Member:
Name: Hercule-messagerie-10.1.2.1
Description:
Type: Host
Address: 10.1.2.1
MAC Address:
NetworkEntity Member:
Name: Hercule-web-10.1.1.1
Description:
Type: Host
Address: 10.1.1.1
MAC Address:
NetworkEntity Member:
Name: Loup
Description:
Type: Host
Address: 10.1.4.4
MAC Address:
NetworkEntity Member:
Name: Pegase
Description:
Type: Host
Address: 10.1.2.2
MAC Address:
NetworkEntity Member:
Name: PetiteOurse
Description:
Type: Host
Address: 10.1.4.3
MAC Address:
NetworkEntity Member:
Name: Portable
Description:
Type: Host
Address: 192.168.0.9
MAC Address:
NetworkEntity Member:
Name: Serpent
Description:
Type: Host
Address: 10.1.4.5
MAC Address:
====================================================
Name: Eridan
Description:
Type: Host
Address: 10.1.3.3
MAC Address:
====================================================
Name: Fleche
Description:
Type: Host
Address: 10.1.4.2
MAC Address:
====================================================
Name: GrandeOurse
Description:
Type: Host
Address: 10.1.3.2
MAC Address:
====================================================
Name: Hercule
Description:
Type: Group
NetworkEntity Member:
Name: Hercule-autorisation-10.1.3.1
Description:
Type: Host
Address: 10.1.3.1
MAC Address:
NetworkEntity Member:
Name: Hercule-externe-192.168.0.1
Description:
Type: Host
Address: 192.168.0.1
MAC Address:
NetworkEntity Member:
Name: Hercule-interco-10.1.6.1
Description:
Type: Host
Address: 10.1.6.1
MAC Address:
NetworkEntity Member:
Name: Hercule-messagerie-10.1.2.1
Description:
Type: Host
Address: 10.1.2.1
MAC Address:
NetworkEntity Member:
Name: Hercule-web-10.1.1.1
Description:
Type: Host
Address: 10.1.1.1
MAC Address:
====================================================
Name: Hercule-autorisation-10.1.3.1
Description:
Type: Host
Address: 10.1.3.1
MAC Address:
====================================================
Name: Hercule-externe-192.168.0.1
Description:
Type: Host
Address: 192.168.0.1
MAC Address:
====================================================
Name: Hercule-interco-10.1.6.1
Description:
Type: Host
Address: 10.1.6.1
MAC Address:
====================================================
Name: Hercule-messagerie-10.1.2.1
Description:
Type: Host
Address: 10.1.2.1
MAC Address:
====================================================
Name: Hercule-web-10.1.1.1
Description:
Type: Host
Address: 10.1.1.1
MAC Address:
====================================================
Name: HoteHebergementSignaturesAntivirales1
Description:
Type: Host
Address: clamav.ozforces.com
MAC Address:
====================================================
Name: HoteHebergementSignaturesAntivirales2
Description:
Type: Host
Address: clamav.essentkabel.com
MAC Address:
====================================================
Name: HoteHebergementSignaturesAntivirales3
Description:
Type: Host
Address: clamav.elektrapro.com
MAC Address:
====================================================
Name: Loup
Description:
Type: Host
Address: 10.1.4.4
MAC Address:
====================================================
Name: Pegase
Description:
Type: Host
Address: 10.1.2.2
MAC Address:
====================================================
Name: PetiteOurse
Description:
Type: Host
Address: 10.1.4.3
MAC Address:
====================================================
Name: Portable
Description:
Type: Host
Address: 192.168.0.9
MAC Address:
====================================================
Name: Serpent
Description:
Type: Host
Address: 10.1.4.5
MAC Address:
====================================================
Name: ServeurDebianECP
Description:
Type: Host
Address: 138.195.130.75
MAC Address:
====================================================
Name: ServeurPackagesDebian1
Description:
Type: Host
Address: http.us.debian.org
MAC Address:
====================================================
Name: ServeurPackagesDebian2
Description:
Type: Host
Address: ftp.fr.debian.org
MAC Address:
====================================================
Name: ServeurSecurityDebian
Description: security.debian.org
Type: Host
Address: 194.109.137.218
MAC Address:
====================================================
Name: Serveurs-Maquette
Description:
Type: Group
NetworkEntity Member:
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
NetworkEntity Member:
Name: Dauphin
Description:
Type: Host
Address: 52.30.184.1
MAC Address:
NetworkEntity Member:
Name: Eridan
Description:
Type: Host
Address: 10.1.3.3
MAC Address:
NetworkEntity Member:
Name: Fleche
Description:
Type: Host
Address: 10.1.4.2
MAC Address:
NetworkEntity Member:
Name: GrandeOurse
Description:
Type: Host
Address: 10.1.3.2
MAC Address:
NetworkEntity Member:
Name: Hercule-autorisation-10.1.3.1
Description:
Type: Host
Address: 10.1.3.1
MAC Address:
NetworkEntity Member:
Name: Hercule-externe-192.168.0.1
Description:
Type: Host
Address: 192.168.0.1
MAC Address:
NetworkEntity Member:
Name: Hercule-interco-10.1.6.1
Description:
Type: Host
Address: 10.1.6.1
MAC Address:
NetworkEntity Member:
Name: Hercule-messagerie-10.1.2.1
Description:
Type: Host
Address: 10.1.2.1
MAC Address:
NetworkEntity Member:
Name: Hercule-web-10.1.1.1
Description:
Type: Host
Address: 10.1.1.1
MAC Address:
NetworkEntity Member:
Name: Loup
Description:
Type: Host
Address: 10.1.4.4
MAC Address:
NetworkEntity Member:
Name: Pegase
Description:
Type: Host
Address: 10.1.2.2
MAC Address:
NetworkEntity Member:
Name: PetiteOurse
Description:
Type: Host
Address: 10.1.4.3
MAC Address:
NetworkEntity Member:
Name: Serpent
Description:
Type: Host
Address: 10.1.4.5
MAC Address:
====================================================
Name: ServeursWebInternes
Description:
Type: Group
NetworkEntity Member:
Name: Colombe
Description:
Type: Host
Address: 10.1.1.2
MAC Address:
NetworkEntity Member:
Name: GrandeOurse
Description:
Type: Host
Address: 10.1.3.2
MAC Address:
NetworkEntity Member:
Name: Pegase
Description:
Type: Host
Address: 10.1.2.2
MAC Address:
====================================================
Name: ServeursWebatteignablesServeursMaquette
Description:
Type: Group
NetworkEntity Member:
Name: HoteHebergementSignaturesAntivirales1
Description:
Type: Host
Address: clamav.ozforces.com
MAC Address:
NetworkEntity Member:
Name: HoteHebergementSignaturesAntivirales2
Description:
Type: Host
Address: clamav.essentkabel.com
MAC Address:
NetworkEntity Member:
Name: HoteHebergementSignaturesAntivirales3
Description:
Type: Host
Address: clamav.elektrapro.com
MAC Address:
NetworkEntity Member:
Name: ServeurDebianECP
Description:
Type: Host
Address: 138.195.130.75
MAC Address:
NetworkEntity Member:
Name: ServeurPackagesDebian1
Description:
Type: Host
Address: http.us.debian.org
MAC Address:
NetworkEntity Member:
Name: ServeurPackagesDebian2
Description:
Type: Host
Address: ftp.fr.debian.org
MAC Address:
NetworkEntity Member:
Name: ServeurSecurityDebian
Description: security.debian.org
Type: Host
Address: 194.109.137.218
MAC Address:
====================================================
Name: Sub-autorisation-10.1.3.0
Description:
Type: Subnet
Address: 10.1.3.0
Network Mask: 255.255.255.0
====================================================
Name: Sub-externe-192.168.0.0
Description:
Type: Subnet
Address: 192.168.0.0
Network Mask: 255.255.255.0
====================================================
Name: Sub-interco-10.1.6.0
Description:
Type: Subnet
Address: 10.1.6.0
Network Mask: 255.255.255.0
====================================================
Name: Sub-interne-10.1.4.0
Description: Reseau interne 10.1.4.0
Type: Subnet
Address: 10.1.4.0
Network Mask: 255.255.255.0
====================================================
Name: Sub-messagerie-10.1.2.0
Description:
Type: Subnet
Address: 10.1.2.0
Network Mask: 255.255.255.0
====================================================
Name: Sub-web-10.1.1.0
Description:
Type: Subnet
Address: 10.1.1.0
Network Mask: 255.255.255.0
====================================================
Name: Universe*
Description:
Type: Host
Address: 0.0.0.0
MAC Address:
====================================================
Network Interface Report
Name:
Interface-Interconnection
Gateway: FW-APPLI
Description:
IP Address: 10.1.6.2
ConnectedToInside: 0
Illegal Address: 0
Allow Multicast: 0
SynFlood Protection: 0
Portscan Protection: 1
Netmask: 255.255.255.0
DLCI:
Transparent Clients:
Transparent Servers:
Spoof Protected Networks:
Input Filter:
Output Filter:
====================================================
Name:
Interface-interne
Gateway: FW-APPLI
Description:
IP Address: 10.1.4.1
ConnectedToInside: 1
Illegal Address: 1
Allow Multicast: 0
SynFlood Protection: 0
Portscan Protection: 0
Netmask: 255.255.255.0
DLCI:
Transparent Clients:
Transparent Servers:
Spoof Protected Networks:
Input Filter:
Output Filter:
====================================================
Protocol Report
Name |
Read Only Protocol |
Description |
Base Protocol |
Protocol Number |
Message Type |
Destination Port Range |
Source Port Range |
AH |
True |
IPSEC, IP Authentication Header |
IP |
51 |
|
|
|
AIM |
True |
AOL Instant Messenger |
TCP |
|
|
5190 |
0-65535 |
E-Sentry |
False |
|
TCP |
|
|
1701 |
|
EGP |
True |
Exterior Gateway Protocol |
IP |
8 |
|
|
|
EON |
True |
ISO clnp |
IP |
80 |
|
|
|
ESP |
True |
IPSEC, IP Encapsulating Security Payload |
IP |
50 |
|
|
|
HELLO |
True |
Hello Routing Protocol |
IP |
63 |
|
|
|
ICMP |
True |
Internet Control Message Protocol |
IP |
1 |
|
|
|
IGMP |
True |
Internet Group Control Protocol |
IP |
2 |
|
|
|
IPIP |
True |
SWIPE |
IP |
94 |
|
|
|
IPinIP |
True |
IP in IP encapsulation |
IP |
4 |
|
|
|
Imaps |
False |
|
TCP |
|
|
993 |
|
LDAPS |
False |
|
TCP |
|
|
636 |
1024-65535 |
PUP |
True |
PUP |
IP |
12 |
|
|
|
RAW |
True |
Raw IP |
IP |
255 |
|
|
|
SMTP-TLS |
False |
|
TCP |
|
|
25 |
1024-65535 |
SYSLOG |
False |
|
UDP |
|
|
514 |
514 |
TCP |
True |
Transmission Control Protocol |
IP |
6 |
|
|
|
UDP |
True |
User Datagram Protocol |
IP |
17 |
|
|
|
auth |
True |
Authentication Service |
TCP |
|
|
113 |
1024-65535 |
bftp |
True |
|
TCP |
|
|
152 |
1024-65535 |
biff |
True |
|
UDP |
|
|
512 |
1024-65535 |
biff_rev |
True |
|
UDP |
|
|
1024-65535 |
512 |
chargen_tcp |
True |
|
TCP |
|
|
19 |
1024-65535 |
chargen_udp |
True |
|
UDP |
|
|
19 |
1024-65535 |
chargen_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
19 |
cifs |
True |
|
TCP |
|
|
139 |
1024-65535 |
daytime_tcp |
True |
|
TCP |
|
|
13 |
1024-65535 |
daytime_udp |
True |
|
UDP |
|
|
13 |
1024-65535 |
daytime_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
13 |
discard_tcp |
True |
|
TCP |
|
|
9 |
1024-65535 |
discard_udp |
True |
|
UDP |
|
|
9 |
1024-65535 |
dns_tcp |
True |
DNS Zone transfer |
TCP |
|
|
53 |
1024-65535 |
dns_udp |
True |
DNS Resolver request |
UDP |
|
|
53 |
1024-65535 |
dns_udp_rev |
True |
DNS Resolver response |
UDP |
|
|
1024-65535 |
53 |
dns_udp_s2s |
True |
DNS Server to DNS Server |
UDP |
|
|
53 |
53 |
echo_tcp |
True |
|
TCP |
|
|
7 |
1024-65535 |
echo_udp |
True |
|
UDP |
|
|
7 |
1024-65535 |
echo_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
7 |
esm_agent |
True |
ESM Agent |
TCP |
|
|
5601 |
1024-65535 |
esm_mgr |
True |
ESM Manager |
TCP |
|
|
5600 |
1024-65535 |
esm_rem_install |
True |
ESM Remote Installation |
TCP |
|
|
5599 |
1024-65535 |
esm_rev_install |
True |
ESM Reverse Installation |
TCP |
|
|
1025-5000 |
1024-65535 |
exec |
True |
|
TCP |
|
|
512 |
1024-65535 |
finger |
True |
|
TCP |
|
|
79 |
1024-65535 |
ftp |
True |
File Transfer Control |
TCP |
|
|
21 |
1024-65535 |
gopher |
True |
|
TCP |
|
|
70 |
1024-65535 |
gwproxy |
True |
|
TCP |
|
|
416 |
1024-65535 |
h323 |
True |
H.323 Audio/Video conferencing |
TCP |
|
|
1720 |
1024-65535 |
hawk |
True |
|
TCP |
|
|
418 |
1024-65535 |
http |
True |
HTTP |
TCP |
|
|
80 |
1024-65535 |
https |
True |
HTTP over SSL |
TCP |
|
|
443 |
1024-65535 |
icmp_dest_unreachable |
True |
ICMP Destination Unreachable |
ICMP |
|
3 |
|
|
icmp_echo_reply |
True |
ICMP Echo Reply |
ICMP |
|
0 |
|
|
icmp_echo_request |
True |
ICMP Echo Request |
ICMP |
|
8 |
|
|
icmp_src_quench |
True |
ICMP Source Quench |
ICMP |
|
4 |
|
|
icmp_time_exceeded |
True |
ICMP Time Exceeded |
ICMP |
|
11 |
|
|
isakmp |
True |
ISAKMP |
UDP |
|
|
500 |
500 |
iso-tsap |
True |
|
TCP |
|
|
102 |
1024-65535 |
ita_admin |
True |
|
TCP |
|
|
3833 |
1024-65535 |
ita_agent |
True |
|
TCP |
|
|
5052 |
1024-65535 |
ita_mgr |
True |
|
TCP |
|
|
5051 |
1024-65535 |
ita_view |
True |
|
TCP |
|
|
3834 |
1024-65535 |
kerberos_auth_88 |
True |
kerberos authentication |
UDP |
|
|
88 |
1024-65535 |
kerberos_tcp |
True |
|
TCP |
|
|
750 |
1024-65535 |
kerberos_udp |
True |
|
UDP |
|
|
750 |
1024-65535 |
kerberos_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
750 |
lockd_tcp |
True |
|
TCP |
|
|
4045 |
1024-65535 |
lockd_udp |
True |
|
UDP |
|
|
4045 |
1024-65535 |
lockd_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
4045 |
login |
True |
|
TCP |
|
|
513 |
0-1023 |
nbdgram |
True |
|
UDP |
|
|
138 |
0-65535 |
netbios_137_tcp |
True |
|
TCP |
|
|
137 |
1024-65535 |
netbios_137_udp |
True |
|
UDP |
|
|
137 |
137 |
netbios_138_tcp |
True |
|
TCP |
|
|
138 |
1024-65535 |
netbios_138_udp |
True |
|
UDP |
|
|
138 |
138 |
netbios_139_tcp |
True |
|
TCP |
|
|
139 |
1024-65535 |
netbios_139_udp |
True |
|
UDP |
|
|
139 |
139 |
netmeeting_audio_control |
True |
|
TCP |
|
|
1731 |
1024-65535 |
netstat |
True |
|
TCP |
|
|
15 |
1024-65535 |
nfsd_tcp |
True |
|
TCP |
|
|
2049 |
1024-65535 |
nfsd_udp |
True |
|
UDP |
|
|
2049 |
1024-65535 |
nfsd_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
2049 |
nntp |
True |
USENET News |
TCP |
|
|
119 |
1024-65535 |
nsetupd |
True |
Raptor Mobile/Desk Setup Daemon |
TCP |
|
|
420 |
1024-65535 |
ntp |
True |
NTP Client request |
UDP |
|
|
123 |
1024-65535 |
ntp_rev |
True |
NTP Client response |
UDP |
|
|
1024-65535 |
123 |
ntp_s2s |
True |
NTP Server to Server |
UDP |
|
|
123 |
123 |
pc_anywhere_tcp |
True |
PC Anywhere Data |
TCP |
|
|
5631 |
1024-65535 |
pc_anywhere_udp |
True |
PC Anywhere Status |
UDP |
|
|
5632 |
1024-65535 |
pcserver |
True |
|
TCP |
|
|
600 |
1024-65535 |
ping |
True |
ICMP Echo |
ICMP |
|
8 |
|
|
pop-2 |
True |
|
TCP |
|
|
109 |
1024-65535 |
pop-3 |
True |
|
TCP |
|
|
110 |
1024-65535 |
printer |
True |
|
TCP |
|
|
515 |
1024-65535 |
readeagle |
True |
|
TCP |
|
|
414 |
1024-65535 |
readhawk |
True |
|
TCP |
|
|
418 |
1024-65535 |
realaudio |
True |
Real Audio |
TCP |
|
|
7070 |
1024-65535 |
realaudio_proxy |
True |
Real Audio Proxy |
TCP |
|
|
1090 |
1024-65535 |
realaudio_udp |
True |
Real Audio UDP |
UDP |
|
|
6970-7170 |
1024-65535 |
rip |
True |
|
UDP |
|
|
520 |
1024-65535 |
rip_rev |
True |
|
UDP |
|
|
1024-65535 |
520 |
rtsp |
True |
rtsp |
TCP |
|
|
554 |
1024-65535 |
shell |
True |
|
TCP |
|
|
514 |
1024-65535 |
smtp |
True |
|
TCP |
|
|
25 |
1024-65535 |
snmp |
True |
|
UDP |
|
|
161 |
1024-65535 |
snmp_rev |
True |
|
UDP |
|
|
1024-65535 |
161 |
snmptrap |
True |
|
UDP |
|
|
162 |
1024-65535 |
snmptrap_rev |
True |
|
UDP |
|
|
1024-65535 |
162 |
srl |
True |
Secure Remote Login |
TCP |
|
|
423 |
1024-65535 |
ssh |
False |
Protocole SSH |
TCP |
|
|
22 |
1024-65535 |
sunrpc_tcp |
True |
|
TCP |
|
|
111 |
1024-65535 |
sunrpc_udp |
True |
|
UDP |
|
|
111 |
1024-65535 |
sunrpc_udp_rev |
True |
|
UDP |
|
|
1024-65535 |
111 |
syslog |
True |
|
UDP |
|
|
514 |
1024-65535 |
syslog_rev |
True |
|
UDP |
|
|
1024-65535 |
514 |
systat |
True |
|
TCP |
|
|
11 |
1024-65535 |
t120 |
True |
T.120 Chat/Whiteboard/Application sharing |
TCP |
|
|
1503 |
1024-65535 |
tacacs |
True |
|
TCP |
|
|
49 |
1024-65535 |
telnet |
True |
|
TCP |
|
|
23 |
1024-65535 |
tftp |
True |
|
UDP |
|
|
69 |
1024-65535 |
tftp_rev |
True |
|
UDP |
|
|
1024-65535 |
69 |
uucp |
True |
|
TCP |
|
|
540 |
1024-65535 |
visualizer |
True |
Raptor Systems NetWatch |
TCP |
|
|
417 |
1024-65535 |
who |
True |
|
UDP |
|
|
513 |
1024-65535 |
who_rev |
True |
|
UDP |
|
|
1024-65535 |
513 |
whois |
True |
|
TCP |
|
|
43 |
1024-65535 |
x-server0 |
True |
X - Display 0 |
TCP |
|
|
6000 |
1024-65535 |
x-server1 |
True |
X - Display 1 |
TCP |
|
|
6001 |
1024-65535 |
Proxy Services Report
Name: CIFSD Enabled: TRUE Trace: FALSE Timeout: 300 TCP Port: 1039 |
Name: DNSD Enabled: Enable Host Master: FW-APPLI Serial Format: yyymmddHHM SOA Refresh: 43200 SOA Retry: 3600 SOA Expire: 2678400 Default TTL: 3600 Max TTL: 604800 Report Trace Info: 0 Verbose Trace: 0 Deny Outside RFC1597: 1 Log RFC1597 Failures: 1 Transfer to NS only: 1 Host File Directory: C:/WINNT/system32/drivers/etc Interal Host Name: FW-APPLI External Host Name: FW-APPLI |
Name: FTPD Enabled: Disable Timeout: 900 Allow Low Ports: NO Allow Named Ports: NO |
Name: GSPD TCP Enabled: TRUE TCP Timeout: 3600 TCP All Ports Enabled: TRUE UDP Enabled: TRUE UDP Timeout: 60 IP Enabled: TRUE IP Timeout: 3600 Allow Reserved Services: Yes |
Name: H323D Status: Enable Timeout: 300 Linger: 0 Port: 1720 Trace Files: Off Loose Security: UDP Low Port: 20000 UDP High Port: 30000 |
Name: HTTPD Enabled: Enable URL: Listen on Ports: Listen on HTTP Ports: Timeout: 600 Keep Alive Time: 120 Default Extentsion: .html SFG IP: SFG Port: Web Proxy: WebProxy Port: |
Name: NBDGRAMD Enabled: True Log UDP Broadcasts: False Filter MailSlots: False Mailslots: Mailslots: Name: \MAILSLOT\TEMP\NETLOGON Description: Exact Match: TRUE Name: \MAILSLOT\LANMAN Description: Exact Match: TRUE Name: \MAILSLOT\MSBROWSE Description: Exact Match: TRUE Name: \MAILSLOT\BROWSE Description: Exact Match: TRUE Name: \MAILSLOT\NET\NETLOGON Description: Exact Match: TRUE Name: \MAILSLOT\NET\NTLOGON Description: Exact Match: TRUE Name: \MAILSLOT\NET\GETDC Description: Exact Match: FALSE |
Name: NNTPD State: Enable Trace Files: Off Timeout: 300 Cache Increment: 4096 Max. Cache: 65536 Strict: 0 Drop Policy: 0 Listen: Mininum Visit: 5 Linger: Off |
Name: NTPD Enabled: Enable |
Name: PINGD Enabled: True |
Name: RTSPD Enabled: True |
Name: SIPD Enabled: True |
Name: SMTPD Status: Disable Recognized Debug Command: Off FlowControlCheck: Off Trace: Off Trace Telnet: Off Timeout: 330 Smart Server: Check Sender Regular Expression: Off Bad Sender Regualar Expression: Check Sender Domain: Off Realtime Blackhole List: Off Realtime Blackhole Domain: |
Name: SQLNETD Enabled: Enable Listen: 1521 Answer Timeout: 1 |
Name: TELNETD Enabled: TRUE Timeout: 3600 |
Name: WAPD Enabled: True |
Gateway Services Report
Name: Fetcher Daemon Enabled: Disable |
Name: Gateway Parameters Reverse Lookup: Disable Log Gwcontrol: Off Log Using Hostnames: Off Forward Filter: FiltresMaquette DNS Resolver Name to Address Lookup Timeout (seconds): DNS Resolver Address to Name Timeout (seconds): Process Restart: Enable Restart Interval: 10 Max. Restart Attempts: 10 Restart Retry Period: 3600 Restart Failure Log Threshold: 1 |
Name: LDAP Authentication LDAP Server: grandeourse TCP Port: 389 Alternate Server: Alternate Server TCP Port: 389 Base DN: ou=Maquette de test,o=sga Bind Firewall DN: No Firewall DN: Use Clear Text for User Password If Necessary: No Use Standard Schema: 0 User Object Class: inetorgperson Group Object Class: groupOfUniqueNames UID Attribute: uid Primary Group Attribute: cn Group Member Attribute: uniquemember Group Member Type: 1 |
Name: Notify Daemon Enabled: Enable COM Port: |
Name: SecurID Authentication Nearest Server: |
Name: Tacacs Daemon Enabled: FALSE Service: firewall Eagle Group Attributes: eaglegroup |
Name: OOBA Daemon Enabled: Enable HTTPD Pervasive: 0 Authentication Method: ldap HTTPD Ticket Timeout(sec): 3600 HTTPD Lifetime (sec): 28800 HTTPD Max. Use: 10000 Services Ticket Timeout(sec): 3600 Services Lifetime (sec): 3600 Services Max. Use: 10 Use Client IP Address to verify ticket: 0 Port number: 888 Share secret with other firewall: 0 Servers: |
Redirect Services Report
Service Redirect ID |
Description |
Protocol |
Gateway |
All Interfaces |
Source |
Mask |
Destination |
Port |
Rules Report
Rule ID:
1
Description: Authentification des utilisateurs sur LDAP
Access Mode: Allow
Services: LDAPS
Service Limits: 636/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 0
In Via: Any
Out Via: Any
Source: Serveurs-Maquette
Destination: GrandeOurse
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 0
====================================================
Rule ID:
10
Description: Administration du serveur E-Sentry
Access Mode: Allow
Services: http*
Service Limits: http-https http-tunnel.443.4443 http-allurl
http-allext
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 http:0
http-https:1 http-tunnel:list http-tunnel.list:443.4443 http-dcom-tunnel:0
http-ftp:0 http-gopher:0 http-finjan:0 http-allurl:0 http-allext:0 http-proxy:
http-proxy.ipaddress:
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsWeb
Destination: Eridan
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
11
Description: Acces Messagerie des clients internes
Access Mode: Allow
Services: Imaps SMTP-TLS
Service Limits: 993/tcp 25/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
smtp.rlimit.soft: smtp.rlimit.hard: smtp.hide: smtp.read:
smtp.check_orig_domain:0 smtp.no_srcroutes:0 smtp.no_telnet:0
smtp.loose_recip:0 smtp.loose_orig:0 smtp.no_esmtp:1 smtp.odmr:1 smtp.auth:1
smtp.etrn:1 smtp.expn:1 smtp.vrfy:1
Advanced Services:
Application Scanning: 0
In Via: Any
Out Via: Any
Source: ClientsMessagerie
Destination: Dauphin
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 0
====================================================
Rule ID:
12
Description: Reception des mails depuis externe
Access Mode: Allow
Services: SMTP-TLS
Service Limits: 25/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
smtp.rlimit.soft: smtp.rlimit.hard: smtp.hide: smtp.read: smtp.check_orig_domain:0
smtp.no_srcroutes:0 smtp.no_telnet:0 smtp.loose_recip:0 smtp.loose_orig:0
smtp.no_esmtp:1 smtp.odmr:1 smtp.auth:1 smtp.etrn:1 smtp.expn:1 smtp.vrfy:1
Advanced Services:
Application Scanning: 0
In Via: Any
Out Via: Any
Source: Pegase
Destination: Dauphin
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 0
====================================================
Rule ID:
13
Description: Envoi des mails depuis interne
Access Mode: Allow
Services: SMTP-TLS
Service Limits: 25/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
smtp.rlimit.soft: smtp.rlimit.hard: smtp.hide: smtp.read:
smtp.check_orig_domain:0 smtp.no_srcroutes:0 smtp.no_telnet:0
smtp.loose_recip:0 smtp.loose_orig:0 smtp.no_esmtp:1 smtp.odmr:1 smtp.auth:1
smtp.etrn:1 smtp.expn:1 smtp.vrfy:1
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: Dauphin
Destination: Pegase
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
14
Description: Acces DNS des serveurs Maquette
Access Mode: Allow
Services: dns_udp dns_udp_rev
Service Limits: 53/udp 1024-65535/udp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: Serveurs-Maquette
Destination: DNSexternes
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
15
Description: Autorisation du PING
Access Mode: Allow
Services: ping*
Service Limits: ping
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: EnsembleMachinesMaquette
Destination: EnsembleMachinesMaquette
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
16
Description: Acces MAJ Debian serveurs Maquette
Access Mode: Allow
Services: http*
Service Limits: http http-allurl http-allext
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 http:1
http-https:0 http-tunnel:any http-tunnel.list: http-dcom-tunnel:0 http-ftp:0
http-gopher:0 http-finjan:0 http-allurl:0 http-allext:0 http-proxy:
http-proxy.ipaddress:
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: Serveurs-Maquette
Destination: ServeursWebatteignablesServeursMaquette
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
17
Description: Acces Web Reverse Proxy serveurs internes
Access Mode: Allow
Services: http*
Service Limits: http http-https http-tunnel.443 http-allurl
http-allext
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 http:1
http-https:1 http-tunnel:list http-tunnel.list:443 http-dcom-tunnel:0
http-ftp:0 http-gopher:0 http-finjan:0 http-allurl:0 http-allext:0 http-proxy:
http-proxy.ipaddress:
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: Fleche
Destination: ServeursWebInternes
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
18
Description: Acces Web serveur messagerie interne
Access Mode: Allow
Services: http*
Service Limits: http http-https http-tunnel.any http-allurl
http-allext
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 http:1
http-https:1 http-tunnel:any http-tunnel.list: http-dcom-tunnel:0 http-ftp:0
http-gopher:0 http-finjan:0 http-allurl:0 http-allext:0 http-proxy:
http-proxy.ipaddress:
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsMessagerie
Destination: Dauphin
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
19
Description: Acces Web pour administration LDAP
Access Mode: Allow
Services: http*
Service Limits: http-https http-tunnel.443 http-allurl http-allext
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 http:0
http-https:1 http-tunnel:list http-tunnel.list:443 http-dcom-tunnel:0
http-ftp:0 http-gopher:0 http-finjan:0 http-allurl:0 http-allext:0 http-proxy:
http-proxy.ipaddress:
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsWeb
Destination: GrandeOurse
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
2
Description: Deport des logs sur PetiteOurse
Access Mode: Allow
Services: SYSLOG
Service Limits: 514/udp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 0
In Via: Any
Out Via: Any
Source: Serveurs-Maquette
Destination: PetiteOurse
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 0
====================================================
Rule ID:
3
Description: Administration SSH des serveurs Maquette
Access Mode: Allow
Services: ssh
Service Limits: 22/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 0
In Via: Any
Out Via: Any
Source: EnsembleMachinesMaquette
Destination: Serveurs-Maquette
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 0
====================================================
Rule ID:
4
Description: Acces SAMBA des clients
Access Mode: Allow
Services: cifs*
Service Limits: cifs
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 cifs-noread:0
cifs-nowrite:0 cifs-noprint:0 cifs-nopipe:0 cifs-nodisk:0 cifs-nocomm:0
cifs-nogeneric:0 cifs-nolist:0 cifs-nodelete:0 cifs-norename:0 cifs-nochmod:0
cifs-log:1
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsSamba
Destination: Colombe
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
5
Description: Acces Messagerie des clients externes
Access Mode: Allow
Services: Imaps SMTP-TLS
Service Limits: 993/tcp 25/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
smtp.rlimit.soft: smtp.rlimit.hard: smtp.hide: smtp.read:
smtp.check_orig_domain:0 smtp.no_srcroutes:0 smtp.no_telnet:0
smtp.loose_recip:0 smtp.loose_orig:0 smtp.no_esmtp:1 smtp.odmr:0 smtp.auth:1
smtp.etrn:0 smtp.expn:0 smtp.vrfy:0
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsMessagerie
Destination: Pegase
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
6
Description: Acces e-Sentry des agents
Access Mode: Allow
Services: E-Sentry
Service Limits: 1701/tcp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 0
In Via: Any
Out Via: Any
Source: ClientsE-Sentry
Destination: Eridan
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 0
====================================================
Rule ID:
7
Description: Acces NTP des clients internes
Access Mode: Allow
Services: ntp ntp_rev
Service Limits: 123/udp 1024-65535/udp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsNTPinterne
Destination: Hercule
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
8
Description: Acces NTP serveur interne
Access Mode: Allow
Services: ntp ntp_rev ntp_s2s
Service Limits: 123/udp 1024-65535/udp 123/udp
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: Hercule-externe-192.168.0.1
Destination: Universe*
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================
Rule ID:
9
Description: Acces WEB des clients externes
Access Mode: Allow
Services: http*
Service Limits: http http-https http-tunnel.443.4443 http-allurl http-allext
Proxy Limits: ftp-disallow-gets:0 ftp-disallow-puts:0 http:1
http-https:1 http-tunnel:list http-tunnel.list:443.4443 http-dcom-tunnel:0
http-ftp:0 http-gopher:0 http-finjan:0 http-allurl:0 http-allext:0 http-proxy:
http-proxy.ipaddress:
Advanced Services:
Application Scanning: 1
In Via: Any
Out Via: Any
Source: ClientsWeb
Destination: Fleche
Time:
Authentication:
User:
User:
Group:
Group:
Alert 5 minutes threshold:
Alert 15 minutes threshold:
Alert Hour threshold:
Alert Day threshold:
Alert Week threshold:
Log Normal Activity: 1
Application Data Scanning: 1
====================================================